Sciweavers

2863 search results - page 389 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
113
Voted
GIS
2010
ACM
15 years 2 months ago
Exploiting local node cache in top-k queries within wireless sensor networks
Top-k queries are a popular type of query in Wireless Sensor Networks. Typical solutions rely on coordinated root-tonodes and nodes-to-root messages and on maintaining filters at...
Johannes Niedermayer, Mario A. Nascimento, Matthia...
147
Voted
CVPR
2012
IEEE
13 years 6 months ago
3D landmark model discovery from a registered set of organic shapes
We present a machine learning framework that automatically generates a model set of landmarks for some class of registered 3D objects: here we use human faces. The aim is to repla...
Clement Creusot, Nick Pears, Jim Austin
128
Voted
CCGRID
2010
IEEE
15 years 4 months ago
Selective Recovery from Failures in a Task Parallel Programming Model
Abstract--We present a fault tolerant task pool execution environment that is capable of performing fine-grain selective restart using a lightweight, distributed task completion tr...
James Dinan, Arjun Singri, P. Sadayappan, Sriram K...
121
Voted
IMC
2005
ACM
15 years 9 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
174
Voted
JCSC
2002
129views more  JCSC 2002»
15 years 3 months ago
Leakage Current Reduction in VLSI Systems
There is a growing need to analyze and optimize the stand-by component of power in digital circuits designed for portable and battery-powered applications. Since these circuits re...
David Blaauw, Steven M. Martin, Trevor N. Mudge, K...